Posts Tagged ‘ibm research’

IBM’s mobile computing juggernaut continues with a new deal just announced in Saudia Arabia.

Etihad Etisalat (Mobily) and IBM announced today a 5-year agreement worth approximately $280 million to provide comprehensive IT solutions for the Saudi Arabian company.

Saudi Arabia: 870,000 Square Miles

Riyadh is the capital and largest city of Saudi Arabia. It is also the capital of Riyadh Province, and belongs to the historical regions of Najd and Al-Yamama (Source: Wikipedia) IBM and Mobily, the Saudi Arabian telecommunications firm, will collaborate on future innovation with the help of IBM Research, using IBM’s Spoken Web solution. The basic principle of Spoken Web uses speech to create voice sites using the mobile phone network to establish a spoken version of the internet. The opportunity to collaborate with leading IBM researchers has become a key differentiator for IBM.

Saudi Arabia is a big place, encompassing some 870,000 square miles with a population approaching 30 million people. Mobily, as the fastest growing telecommunications company in Saudia Arabia, has experienced an explosion in demand from the growing number of subscribers using mobile devices, and so in turn needed to boost its IT capacity and innovation in the market.

This new agreement with IBM will provide Mobily with faster, targeted access to new technologies and expertise so it can build a strong infrastructure to keep up with the company’s business growth.

As Mobily gears up for further expansion, it wanted to improve the quality and speed of its operations using IBM best practices.

As part of the agreement, Mobily and IBM will collaborate on future innovation with the help of IBM Research, for example, using IBM’s Spoken Web solution.

The basic principle of Spoken Web uses speech to create voice sites using the mobile phone network to establish a spoken version of the internet. The opportunity to collaborate with leading IBM researchers has become a key differentiator for IBM.

IBM’s Growth Market Strategy

The agreement highlights IBM’s continued geographic expansion initiative to strategically increase its presence in key growth markets like Saudi Arabia in support of its global growth strategy.

IBM is ramping up its investment across the Middle East and Africa, harnessing the company’s Smarter Planet initiative to help both public and private sector clients do more with fewer resources.

The strategic management of IT remains with Mobily, ensuring continuation of its standards of excellence and cutting-edge architecture, and enabling Mobily to meet the explosion in demand it is seeing from the growing number of subscribers using mobile devices.

“Partnering with one of the largest technology companies in the world offers Mobily a broad portfolio of modern IT solutions that will have a positive impact on our customers in terms of the quality of products and innovative services, in addition to solutions that will enrich their lives. We are pleased to sign with IBM, which has a significant presence in this strategic sector,” said Khalid Al Kaf, CEO, Mobily.

“The agreement is part of our efforts and vision of transforming Mobily into an integrated telecommunications operator. It also supports the Saudi government’s initiative of creating a knowledge-based community, adopting state of the art services and solutions” Al Kaf added.

IBM And Saudi Arabia: Remaking The Kingdom’s Future

IBM is involved in a range of key initiatives in Saudi Arabia, including a joint project with King Abdulaziz City for Science and Technology using innovative membrane technology and solar power to address the shortage of drinking water.

In another project, King Abdullah University of Science and Technology (KAUST) and IBM are collaborating using the most complex, high performance computing system in the region.

Remember “Minority Report?” That scene where Tom Cruise was walking by the billboard, and the billboard “recognized” him through some kind of biometrics (I think it was an eye scan?) and then started to target ads to him?

Well, IBM is doing something really cool and not even like that, but I had to make sure I got your attention so you’d keep reading.

In our case, IBM Research has created a new augmented reality application that gives in-store shoppers instant product details and promotions, all in the palm of their hand.

Here’s how it works: Upon entering a store, consumers download the app on their smart phone or tablet, register, and create a profile of features that matter to them — from product ingredients that could trigger an allergy, to whether packaging is biodegradable.

When they then point their device’s video camera at merchandise, the app will instantly recognize products and, via augmented reality technology, overlay digital details over the images — such as ingredients, price, reviews and discounts that apply that day.

Talk about an educated, empowered consumer!

And, if consumers opt in (their choice!), information from their social networks can be integrated into the information stream. For instance, if a friend had reviewed or made a comment about a product they’re looking at, they’ll see it.

Using IBM’s prototype app, shoppers looking for breakfast cereal could specify they want a brand low in sugar, highly rated by consumers – and on sale.

As a shopper pans the mobile device’s camera across a shelf of cereal boxes, the augmented shopping app reveals which cereals meet the criteria and provides a same-day coupon to entice consumers to make a purchase.

The app, being developed by IBM’s Research lab in Haifa, Israel, addresses the fundamental gap between the wealth of readily available product details on the Web that in-store shoppers don’t have access to — despite the fact that in-store shopping accounts for more than 92% of the retail volume, according to Forrester Research.

Retailers will be able to use the app to build in-store traffic by connecting with individual consumers, turning marketing into a welcomed service that is not intrusive.

In turn, the app can make it easier for retailers to understand consumer likes and dislikes and offer related products in other aisles, such as bananas or milk, to accompany a cereal purchase. It could also make loyalty points and digital coupons become more convenient for shoppers, freeing them from the hassle of searching for discounts.

Too bad the app won’t be ready in time for net week’s MobileBeat 2012, which is being held at the Palace Hotel in downtown San Fran next week (July 10-11).

AllThingsD’s Kara Swisher, Mark Pincus (CEO, Zynga), Michael Bayle (SVP and GM, ESPN Mobile) and a host of other mobile luminaries will be coming together to talk mobile applications, design/UI, and ecosystem, among other mobile-relevant topics.

IBM senior vice president Mike Rhodin explains to the gathered audience in Madrid how the Smarter Commerce initiative was a logical and inevitable offshoot of IBM’s smarter planet campaign, one driven by the need for more insight- and action-driven analytics.

Rhodin’s talk was entitled “Transform Your Business Around the Customer,” again with the central theme of the Summit that if more businesses wanted to keep theirs, they would increasingly have to pivot their business around customer needs.

Rhodin indicated that he wanted to take a step backward from yesterday’s more outcome-driven discussion, and instead talk about “some of the foundational ideas that led us to Smarter Commerce.”

He explained that four years ago, IBM started a conversation about having a “smarter planet,” one increasingly instrumented, interconnected, and intelligent, and that since that time, “analytics emerged as a centerpiece across our entire portfolio.”

Rhodin joked that the financial crisis’ onslaught wasn’t the best time to launch a new marketing campaign, but then explained smarter planet wasn’t that, that it was a signal call heralding a new age of computing. That it was, in fact, the beginning of a movement that was going to happen “no matter what else happened in the world.”

The change this movement would bring was startling. We saw the social media embraced in both the social, political, and, increasingly business realms, and we saw that the physical world was about to become digitized…to some degree, because of the crisis.

Scott Laningham and I sat down with Mike Rhodin in the Smarter Commerce Global Summit Solutions Center just after his keynote in Madrid here this morning to discuss the evolution of the Smarter Commerce initiative, and the opportunity it, and other emerging technologies such as IBM’s Watson, provide companies looking to become more analytics and data-driven.

Ergo, the world, and organizations, needed to better understand systemic risk in advance of its rearing its ugly head. Hence, the need to instrument the world around us.

“Information was flowing around the planet at a breakneck speed,” Rhodin articulated, “and so there was another form of input to make business decisions that became apparent.”

“We also instrumented the virtual world,” he went on, “whereby understanding the sentiment of your employees, your partners, and other constituents was critical.”

Yet all this new data was overwhelming many. “It was growing at such a speed that people couldn’t read or process it with traditional means, and so that’s where analytics started to play a key role, and served as a foundation for Smarter Commerce.”

“This began what we’re classifying as the next generation of computing,” Rhodin went on to explain. “We went through the age of ‘tabulating’ — we’re now entering the age of “information-based” computing.”

In this age, business outcomes are increasingly insight-driven, solutions are more intelligent, and technology is designed to be more and more cognitive.

“It’s not about understanding what happens, but rather, what you do about it, what actions you take,” Rhodin concluded.

With this explosion of data from a hyper-connected society of empowered consumers, we “must extract insight from our most important assets – employees and customers – through smarter analytics,” and the challenge, then, is to address the need for “volume, velocity, and veracity” to help find the right data amidst all those needles amidst all those haystacks.

And it’s a big series of haystacks and needles. The data generated between the dawn of civilization and 2003 is now created every two days! Rhodin explained.

He went on: “These next gen systems are creating opportunities in IT we haven’t seen in 50 years. But now, with all this information and analytics, and the march of globalization, we can start to automate areas of business we could never automate before. We can start to automate and make more intelligent the front-office areas of our business. Chief Financial Officers, CMOs, head of sales, HR…we can turn HR from a reactive to proactive process.”

“We’ve identified a new pattern of automation across industries, one whereby we can instrument, interconnect, and analyze more and more data about the world, and in the process unlock more and more valuable insight,” he explained. “We are infusing intelligent into the fabric of organizational processes. This shift is as profound as the last evolution was to transaction processing and back office automation.”

Last week, we announced the installation of a Blue Gene supercomputer at Rutgers, and earlier today, we discovered that the IBM Blue Gene supercomputer is coming to my great home state of Texas.

Specifically, IBM announced a partnership with Houston’s Rice University to build the first award-winning IBM Blue Gene supercomputer in Texas.

Rice also announced a related collaboration agreement with the University of Sao Paul (USP) in Brazil to initiate the shared administration and use of the Blue Gene supercomputer, which allows both institutions to share the benefits of the new computing resource.

Rice University and IBM today announced a partnership to build the first award-winning IBM Blue Gene supercomputer in Texas. Rice also announced a related collaboration agreement with the University of Sao Paulo (USP) in Brazil to initiate the shared administration and use of the Blue Gene supercomputer, which allows both institutions to share the benefits of the new computing resource.

Now, you all play nice as you go about all that protein folding analysis!

Rice faculty indicated they would be using the Blue Gene to further their own research and to collaborate with academic and industry partners on a broad range of science and engineering questions related to energy, geophysics, basic life sciences, cancer research, personalized medicine and more.

“Collaboration and partnership have a unique place in Rice’s history as a pre-eminent research university, and it is fitting that Rice begins its second century with two innovative partnerships that highlight the university’s commitments to expanding our international reach, strengthening our research and building stronger ties with our home city,” said Rice President David Leebron about the deal.

USP is Brazil’s largest institution of higher education and research, and Rodas said the agreement represents an important bond between Rice and USP. “The joint utilization of the supercomputer by Rice University and USP, much more than a simple sharing of high-tech equipment, means the strength of an effective partnership between both universities,” explained USP President Joao Grandino Rodas.

Unlike the typical desktop or laptop computer, which have a single microprocessor, supercomputers typically contain thousands of processors. This makes them ideal for scientists who study complex problems, because jobs can be divided among all the processors and run in a matter of seconds rather than weeks or months.

Supercomputers are used to simulate things that cannot be reproduced in a laboratory — like Earth’s climate or the collision of galaxies — and to examine vast databases like those used to map underground oil reservoirs or to develop personalized medical treatments.

USP officials said they expect their faculty to use the supercomputer for research ranging from astronomy and weather prediction to particle physics and biotechnology.

In 2009, President Obama recognized IBM and its Blue Gene family of supercomputers with the National Medal of Technology and Innovation, the most prestigious award in the United States given to leading innovators for technological achievement.

Including the Blue Gene/P, Rice has partnered with IBM to launch three new supercomputers during the past two years that have more than quadrupled Rice’s high-performance computing capabilities.

The addition of the Blue Gene/P doubles the number of supercomputing CPU hours that Rice can offer. The six-rack system contains nearly 25,000 processor cores that are capable of conducting about 84 trillion mathematical computations each second. When fully operational, the system is expected to rank among the world’s 300 fastest supercomputers as measured by the TOP500 supercomputer rankings.

WARNING: This is an exceptionally long post intended for security and privacy geeks everywhere, including sys admins, Internet security hawks, CIOs, and innocent but interested bystanders everywhere. No web servers were hacked in the preparation of this report: at least, none by me!

Okay, troopers, it’s that time of year again. You know, the time when IBM releases its report card for security incidents, the X-Force Trend and Risk Report.

Google has the search “Zeitgeist” every year, we have the security “poltergeist!”

This time around, we’re looking back at the wild and wacky 2011, a year which showed surprising improvements in several areas of Internet security. Improvements, you ask? Surely you jest, Turbo.

This figure from the 2011 IBM X-Force Trend And Risk Report shows a steady decline in the instances of input control related vulnerabilities such as cross-site scripting (XSS) and SQL injection since X-Force began recording these statistics in 2007. In 2011, the statistics suggest that the likelihood of encountering XSS in a given test continues to decrease but shows signs of leveling out at approximately a 40 percent chance of occurring. Injection vulnerabilities and specifically SQL injection appears to have leveled out at around a 20 percent chance of occurring in a given test.

No, no, there IS some good news. Like a reduction in application security vulnerabilities, exploit code and spam.

But, good news leads to less good news on this front, as many of you who follow security well know, because the bad guys are being forced to rethink their tactics by targeting more niche IT loopholes and emerging technologies such as social networks and mobile devices.

The Top Line: Less Spam, More Adaptation

To get specific, the X-Force 2011 Trend and Risk Report demonstrated a 50 percent decline in spam email compared to 2010.

2011’s poltergeist saw a diligent patching of security vulnerabilities by software vendors, with only 36 percent of those vulnerabilities remaining unpatched in 2011 (compared to 43 percent in 2010). The year also saw a higher quality of software application code, as seen in web-app vulnerabilities called “cross-site scripting” that were half as likely to exist in clients’ software as they were four years ago.

So, the net is, the bad guys are adapting their techniques to the changing tech environment. The report uncovered a rise in emerging attack trends including mobile exploits, automated password guessing, and a surge in phishing attacks.

It also witnessed an increase in automated shell command injection attacks against web servers, which may well be a response to successful efforts to close off other kinds of Web app vulnerabilities.

Getting even more specific, according to the report, there are several positive trends as companies adjusted their security policies in 2011:

Thirty percent decline in the availability of exploit code. When security vulnerabilities are disclosed, exploit code is sometimes released that attackers can download and use to break into computers. Approximately 30 percent fewer exploits were released in 2011 than were seen on average over the past four years. This improvement can be attributed to architectural and procedural changes made by software developers that help make it more difficult for attackers to successfully exploit vulnerabilities.

Decrease in unpatched security vulnerabilities. When security vulnerabilities are publicly disclosed, it is important that the responsible software vendor provide a patch or fix in a timely fashion. Some security vulnerabilities are never patched, but the percentage of unpatched vulnerabilities has been decreasing steadily over the past few years. In 2011 this number was down to 36 percent from 43 percent in 2010.

Fifty percent reduction in cross site scripting (XSS) vulnerabilities due to improvements in software quality. The IBM X-Force team is seeing significant improvement in the quality of software produced by organizations that use tools like IBM AppScan OnDemand service to analyze, find, and fix vulnerabilities in their code. IBM found XSS vulnerabilities are half as likely to exist in customers’ software as they were four years ago. However, XSS vulnerabilities still appear in about 40 percent of the applications IBM scans. This is still high for something well understood and able to be addressed.

Decline in spam. IBM’s global spam email monitoring network has seen about half the volume of spam email in 2011 that was seen in 2010. Some of this decline can be attributed to the take-down of several large spam botnets, which likely hindered spammers’ ability to send emails. The IBM X-Force team witnessed spam evolve through several generations over the past seven years as spam filtering technology has improved and spammers have adapted their techniques in order to successfully reach readers.

Even with these improvements, there has been a rise in new attack trends and an array of significant, widely reported external network and security breaches.

This figure from the 2011 IBM X-Force Trend And Risk Report shows an increase in mobile operating system exploits in 2011 due to an uptick in malicious activity targeting mobile devices. Because of the two-tiered relationship between phone end users, telecommunications companies, and mobile operating system vendors, disclosed mobile vulnerabilities can remain unpatched on phones for an extended period of time, providing a large window of opportunity to attackers.

As malicious attackers become increasingly savvy, the IBM X-Force documented increases in three key areas of attack activity:

Attacks targeting shell command injection vulnerabilities more than double. For years, SQL injection attacks against web applications have been a popular vector for attackers of all types. SQL injection vulnerabilities allow an attacker to manipulate the database behind a website. As progress has been made to close those vulnerabilities – the number of SQL injection vulnerabilities in publicly maintained web applications dropped by 46 percent in 2011– some attackers have now started to target shell command injection vulnerabilities instead. These vulnerabilities allow the attacker to execute commands directly on a web server. Shell command injection attacks rose by two to three times over the course of 2011. Web application developers should pay close attention to this increasingly popular attack vector.

Spike in automated password guessing – Poor passwords and password policies have played a role in a number of high-profile breaches during 2011. There is also a lot of automated attack activity on the Internet in which attacks scan the net for systems with weak login passwords. IBM observed a large spike in this sort of password guessing activity directed at secure shell servers (SSH) in the later half of 2011.

Increase in phishing attacks that impersonate social networking sites and mail parcel services – The volume of email attributed to phishing was relatively small over the course of 2010 and the first half of 2011, but phishing came back with a vengeance in the second half, reaching volumes that haven’t been seen since 2008. Many of these emails impersonate popular social networking sites and mail parcel services, and entice victims to click on links to web pages that may try to infect their PCs with malware. Some of this activity can also be attributed to advertising click fraud, where spammers use misleading emails to drive traffic to retail websites.

Emerging Technologies Create New Avenues for Attacks

New technologies such as mobile and cloud computing continue to create challenges for enterprise security.

Publicly released mobile exploits rise 19 percent in 2011. This year’s IBM X-Force report focused on a number of emerging trends and best practices to manage the growing trend of “Bring your Own Device,” or BYOD, in the enterprise. IBM X-Force reported a 19 percent increase over the prior yearin the number of exploits publicly released that can be used to target mobile devices. There are many mobile devices in consumers’ hands that have unpatched vulnerabilities to publicly released exploits, creating an opportunity for attackers. IT managers should be prepared to address this growing risk.

Attacks increasingly relate to social media – With the widespread adoption of social media platforms and social technologies, this area has become a target of attacker activity. IBM X-Force observed a surge in phishing emails impersonating social media sites. More sophisticated attackers have also taken notice. The amount of information people are offering in social networks about their personal and professional lives has begun to play a role in pre-attack intelligence gathering for the infiltration of public and private sector computing networks.

Cloud computing presents new challenges – Cloud computing is moving rapidly from emerging to mainstream technology, and rapid growth is anticipated through the end of 2013. In 2011, there were many high profile cloud breaches affecting well-known organizations and large populations of their customers. IT security staff should carefully consider which workloads are sent to third-party cloud providers and what should be kept in-house due to the sensitivity of data. Cloud security requires foresight on the part of the customer as well as flexibility and skills on the part of the cloud provider. The IBM X-Force report notes that the most effective means for managing security in the cloud may be through Service Level Agreements (SLAs) because of the limited impact that an organization can realistically exercise over the cloud computing service. Therefore, careful consideration should be given to ownership, access management, governance and termination when crafting SLAs. The IBM X-Force report encourages cloud customers to take a lifecycle view of the cloud deployment and fully consider the impact to their overall information security posture.

The IBM X-Force 2011 Trend and Risk Report is based on intelligence gathered by one of the industry’s leading security research teams through its research of public vulnerability disclosures findings from more than 4,000 clients, and the monitoring and analysis of an average of 13 billion events daily in 2011.

“In 2011, we’ve seen surprisingly good progress in the fight against attacks through the IT industry’s efforts to improve the quality of software,” said Tom Cross, manager of Threat Intelligence and Strategy for IBM X-Force. “In response, attackers continue to evolve their techniques to find new avenues into an organization. As long as attackers profit from cyber crime, organizations should remain diligent in prioritizing and addressing their vulnerabilities.”

Scientists at IBM Research have achieved major advances in quantum computing device performance that may accelerate the realization of a practical, full-scale quantum computer.

For specific applications, quantum computing, which exploits the underlying quantum mechanical behavior of matter, has the potential to deliver computational power that is unrivaled by any supercomputer today.

Follow the IBM Research blog for coverage to learn more about breakthroughs from IBM scientists.

Quantum computing has been a Holy Grail for researchers ever since Nobel Prize-winning physicist Richard Feynman, in 1981, challenged the scientific community to build computers based on quantum mechanics. For decades, the pursuit remained firmly in the theoretical realm. But now IBM scientists believe they’re on the cusp of building systems that will take computing to a whole new level.

Using a variety of techniques in the IBM labs, scientists have established three new records for reducing errors in elementary computations and retaining the integrity of quantum mechanical properties in quantum bits (qubits) – the basic units that carry information within quantum computing.

IBM has chosen to employ superconducting qubits, which use established microfabrication techniques developed for silicon technology, providing the potential to one day scale up to and manufacture thousands or millions of qubits.

IBM researchers will be presenting their latest results today at the annual American Physical Society meeting taking place February 27-March 2, 2012 in Boston, Mass.

The Possibilities of Quantum Computing

The special properties of qubits will allow quantum computers to work on millions of computations at once, while desktop PCs can typically handle minimal simultaneous computations.

For example, a single 250-qubit state contains more bits of information than there are atoms in the universe.

These properties will have wide-spread implications foremost for the field of data encryption where quantum computers could factor very large numbers like those used to decode and encode sensitive information.

Other potential applications for quantum computing may include searching databases of unstructured information, performing a range of optimization tasks and solving previously unsolvable mathematical problems.

For you regular readers of this blog, you know I attended and blogged the IBM Global SmartCamp Finals in San Francisco week before last…wow, has it already been two weeks?

In fact, it was two weeks ago today that Profitero was announced as this year’s winner.

Although as I mention in the videocast with Scott Laningham below — in which we talk for about 15 minutes about what I saw, heard, and witnessed at the SmartCamp finals — all the participants, as well as those of we IBM bystanders, were winners when it came to hearing some of these groundbreaking business plans for helping build smarter (and more data-driven) cities around the globe.

I also enjoyed meeting my blogging counterpart, Steve Hamm, who provided extensive coverage on IBM’s Smarter Planet blog and with whom I broke bread…err, noodles…somewhere in Chinatown. I couldn’t find my way back to that noodle shop if I had to — I’m not sure if Steve could, either.